Is NET+OS vulnerable to the GHOST exploit?

Problem: This knowledgebase article addresses an exploit entitled GHOST. Officially it is known as CVE-2015-0235. The GHOST name comes from GetHOSTByName. It causes a buffer overflow in calls to
gethostbyname and gethostbyname2 in operating environments
using glibc.

Analysis: Clearly buffer overflows of any kind cause trouble. This vulnerability
causes trouble in calls to gethostbyname and gethostbyname2.
Fortunately, NET+OS does not use or ship glibc and thus is not
vulnerable to the GHOST (CVE-2015-0235) exploit.

Solution: No action is required by the customer as NET+OS is not
vulnerable to CVE-2015-0235.  


GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235).
Copyright 2003 - 2013 Trustwave.

GHOST: glibc vulnerability (CVE-2015-0235).
Copyright 2015 Red Hat Inc.
Last updated: Jan 01, 2024

Recently Viewed

No recently viewed articles

Did you find this article helpful?